Information Governance Toolkit. Information Security Assurance. Detailed Guidance on Secure Transfers

Size: px
Start display at page:

Download "Information Governance Toolkit. Information Security Assurance. Detailed Guidance on Secure Transfers"

Transcription

1 Information Governance Toolkit Information Security Assurance Detailed Guidance on Secure Transfers

2 Information Transfers/Flows - Security Measures 1. The outcomes of information mapping and identified risks should be used to develop staff guidance on appropriate methods of transferring person identifiable and sensitive information in any format (paper, electronic etc). 2. A list of Good Practice Guidance (planned, proposed or already available) to assist secure transfers/flows of information is available from the Knowledge Base Resources. The following points should be considered. 3. NHS Encryption Standards. See Guidelines on Use of Encryption to Protect Person Identifiable and Sensitive Information published in December 2008, which contains guidance on data encryption applications and NHS Information Governance encryption standards. 4. Digital Transfers over the NHS Infrastructure. Due to the inbuilt information security functionality (e.g. NHSmail, Secure File Transfer Service), the NHS infrastructure provides a highly suitable method of transfer of digital information between NHS organisations and others connected to this infrastructure. Where the use of nationally provided infrastructure services is not possible, information transfer standards and procedures must be agreed and established between organisations to ensure professional, NHS and legal obligations are met. NHS Information Governance guidance is available and will help with these choices. 5. Encrypted Transfer and Password Protection of Files. Password protecting files (e.g. using Microsoft Office) will assist in preventing casual compromise if the file is sent to the wrong recipient but is of little use to prevent a person with a little knowledge or determination accessing the file. 6. Transfers of Digital Information (Data) Stored On Removable Media. Use of such media for the purpose of storing personal or otherwise sensitive data must be subject to an Information Risk assessment by the Information Asset Owner (or equivalent). 7. NHS Transfers of Unencrypted Digital Information (Data) By Courier or Post. On 15th January 2008 the NHS Chief Executive directed the immediate suspension of all transfers by courier or post of unencrypted (digital) data of service user identifiable data (including primary care) unless essential for care, and directed that any unencrypted data transfers that continue should be: signed off by the appropriate organisation s Board with a description of how the public will be protected; notified to the appropriate Strategic Health Authority (SHA); any suspended data transfers to be notified to Boards and the appropriate SHA with a plan for how they are to be replaced or made secure.

3 8. Wireless Networks. See Good Practice Guidance. 9. Postal / Courier services. See Secure Courier Procedures within GPG for the transfer of batched person-identifiable data accessible via the Knowledge Base Resources. 10. The chosen transfer method should be adequately secure and cost effective. It may be acceptable to the organisation to routinely post appointment letters which contain the personal details of one service user but this may not be acceptable for a letter containing sensitive details of a number of identifiable service users. If the organisation s procedure is correctly applied and reliable assurance and incident reporting assess that the procedure is adequate, then this will inform reviews of the adequacy of the chosen methods and processes e.g. robust packaging and correct addressing and marking of items. 11. Post. The organisation will need to define the service levels arrangements required from the private or Royal Mail postal service provider: Secure Post is a signature required or not required? Track and trace facility - is this available at individual bag or item level to ensure that items can be identified at any appropriate point in the mail pipeline? Redirected post - what are the arrangements for? Undeliverable post - what are the arrangements for? 12. Courier. A Secure Courier is not an internal postal service or member of staff visiting a location who may act as a casual courier (which some organisations refer to as "couriers"). A Secure Courier will provide a secure and tracked mode of collection and delivery rather than a by hand / personal delivery service. Some Secure Courier services allocate a container to an organisation s items while others may store them in the same container as other organisations courier items at lesser cost. A Secure Courier will be an organisation providing courier services which provide adequate security assurances set out in a written contract. For public sector bodies these courier organisations may have already signed up to the OGC buying solutions framework agreement and therefore already been assessed on the basis of their technical ability and financial standing, eg (as at June 2009): CitySprint DX Group E-Courier UK Ltd Government Car and Despatch Agency TNT UK Royal Mail Group 13. Verbal Communications. The security and confidentiality of telephone and personal conversations should be considered within the organisation s policy and procedures and included in staff training. Staff should be mindful of the

4 need to maintain security and confidentiality when discussing personal or other sensitive information. 14. Telephone Answering Machines. Recorded telephone messages may contain personal or sensitive information such as names and addresses of service users, details of health or social care professionals phoning with queries about service users or applicants for jobs advertised. Consideration should be given to which staff members have access to answering machines. Password protected voic boxes can be used to control access where this functionality is available on the phone. Otherwise, physical protection should be considered, e.g. locating the phone in a lockable office, lowering the speaker volume, etc. 15. Internet Protocol Phones. See Good Practice Guidance General. See Good Practice Guidance. 17. NHSmail. The strategic NHS system NHSmail (xxx.xxx@nhs.net addresses) has been designed to ensure the security and confidentiality of NHS information in transit between account holders and benefits through the integration of strong encryption technology that automatically encrypts messages in transit. The 2010/11 NHS Operating Framework requires NHS organisations to maximise the benefits of investments already made, to positively impact upon transaction costs. In relation to specifically, an expectation exists that NHS organisations and local health communities take advantage of the quality and efficiency benefits available by moving to full use of NHSmail. (See the Knowledge Base Resources for a link to the NHSmail website). 18. NHSmail is currently the only NHS approved method for exchanging patient data by , but only if both sender and recipient use an NHSmail account or if sending to another government secure domain such as: GSi (*.gsi.gov.uk); CJX (*.pnn.police.uk); GSE (*.gse.gov.uk); GSX (*.gsx.gov.uk); GCSX (*.gcsx.gov.uk); SCN (*scn.gov.uk); CJSM (*cjsm.net); MoD (*.mod.uk). 19. NHSmail now includes an encryption feature that allows users to exchange information securely with users of non-accredited or non-secure services. Encryption should primarily be used to exchange sensitive data as part of an agreed clinical workflow, and users should follow any local Information Governance policies that are in place locally for sending sensitive data. All users must be fully trained in the use of and NHSmail accounts. For further advice on using the NHSmail encryption feature, please see 'HSCIC: Sending an encrypted from NHSmail to a non-secure address', available via the Knowledge Base Resources. 20. Where is used to send sensitive information, this should be clearly indicated in the subject header, for example marked Confidential. No service user identifiable information should be contained in the subject heading. See

5 the Knowledge Base Resources to download Guidance for the Classification Marking of NHS Information. 21. Legal Disclaimers. The use of disclaimers on websites and correspondence lessen the potential of litigation against staff and the organisation. The use of disclaimers should be considered where appropriate (for internal as well as external correspondence) to address: breaches of confidentiality; virus transmission; contract protection; negligence for incorrect advice; libel and defamation. 22. Web Applications. See Good Practice Guidance. 23. Remote Desktop Access Software. See Good Practice Guidance. 24. Virtual Private Networks. See Good Practice Guidance. 25. Electronic Diaries. See Good Practice Guidance. 26. SMS Text Messages. There are various potential applications for text messages in the provision of services, e.g. service user appointments. The benefits of using text messages to convey personal information must be weighed against the risks. Key considerations when using text messages are: is the mobile phone number correct? is the mobile phone receiving the text message being used by the intended recipient of the message? has the message been received, and what provision is there to audit message receipt? text messages are normally stored on SIM cards and are typically only cleared when overwritten (not necessarily when erased) - as mobile phones are easy to misplace or may get stolen, there is a danger of a breach of confidentiality occurring that the patient / service user may find distressing or damaging. 27. Text messages should not normally be used to convey sensitive information, e.g. test results and the use of text messages for the transfer of personal data should be kept to a minimum, and e.g. an appointment reminder does not need to include the name of the specific clinic. 28. When consent is sought for appointment reminder services, service users should be informed of what information will be included in standard SMS messages sent to them via the service and the option to opt out must be available on request. 29. Electronic Messaging Software. Electronic instant messaging (IM) software, such as MSN Messenger and Yahoo! Messenger is not suitable for use for the transmission of personal data as it presents a number of risks: IM software is particularly vulnerable to malware, such as virus, Trojans and worms;

6 in many IM services, data is unencrypted. Such services therefore do not provide sufficient security for transmission of service user data, as they are at risk of unauthorised access and electronic surveillance; in many IM services, there are no audit trails of access and transmission. The Care Record Guarantee (NHS and Social Care) has a requirement for systems to maintain audit trails for the access and transmission of service user data; IM services can be used to bypass restrictions on what can be sent as attachments. 30. Whilst it is possible that solutions will be developed in future which offer the necessary security and audit controls, there are no IM solutions currently recognised by the NHS nationally as suitable for transmission of personal information. 31. Faxes and efax. Faxes containing personal or other sensitive information should be subject to safe haven principles and procedures (or the equivalent see Confidentiality and Data Protection requirements) to ensure faxes are safely stored, sent and received and communicated to the recipient. efax should also be subject to safe haven principles. 32. efax software allows users to send or receive a fax via a computer rather than a fax machine. The IG risks for efax are therefore a combination of the risks linked to and standard fax communications. There is currently no efax service recognised as being sufficiently secure to support the routine transfer of service user data.

IG Toolkit Version 8. Information Security Assurance. Requirement 322. Detailed Guidance on Secure Transfers

IG Toolkit Version 8. Information Security Assurance. Requirement 322. Detailed Guidance on Secure Transfers IG Toolkit Version 8 Information Security Assurance Requirement 322 Detailed Guidance on Secure Transfers IG Toolkit Version 8 Requirement 322: Detailed guidance on secure transfers Page 1 of 7 All transfers

More information

Safe Haven Procedure for the Secure Transmission of Personally Identifiable Information

Safe Haven Procedure for the Secure Transmission of Personally Identifiable Information Safe Haven Procedure for the Secure Transmission of Personally Identifiable Information Im&t directorate\policies\approved ig policiesprocedures.1 Index 1. Purpose... 3 2. Introduction... 3 3. Scope...

More information

Information Governance

Information Governance Information Governance Safe Haven Procedures; Guidance for all BHR CCG Staff Fax Machines Email Postage Telephone Conversations Fax Machines Confidential information faxed in emergency situations only

More information

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury

More information

Name of responsible committee: Information Governance Board Date issued: 15 th April 09 Review date: 14 th April 11 Referenced Documents:

Name of responsible committee: Information Governance Board Date issued: 15 th April 09 Review date: 14 th April 11 Referenced Documents: Storage and Transfer of Person Identifiable Information Policy Trust Wide Policy number: ULH-IM&T-AUP03 Version: 1.1 New or Replacement: New Approved by: Executive Board Date approved: 14 th April 09 Name

More information

SMS and Texting - A Guide to the Future

SMS and Texting - A Guide to the Future NHS Information Governance: Information Risk Management Guidance: Short Message Service (SMS) & Texting Department of Health Informatics Directorate April 2010 1 Amendment History Version Date Amendment

More information

Data Transfer Policy. Data Transfer Policy London Borough of Barnet

Data Transfer Policy. Data Transfer Policy London Borough of Barnet Data Transfer Policy Data Transfer Policy London Borough of Barnet Document Control POLICY NAME Data Transfer Policy Document Description Policy surrounding data transfers (electronic and paper based).

More information

Best practice guidance for information security within Choose and Book May 2009

Best practice guidance for information security within Choose and Book May 2009 Best practice guidance for information security within Choose and Book May 2009 Best practice guidance for information security within Choose and Book This guidance has been prepared to help organisations

More information

Corporate Affairs Overview and Scrutiny Committee

Corporate Affairs Overview and Scrutiny Committee Agenda item: 4 Committee: Corporate Affairs Overview and Scrutiny Committee Date of meeting: 29 January 2009 Subject: Lead Officer: Portfolio Holder: Link to Council Priorities: Exempt information: Delegated

More information

Information Security Adults Services. Practice guidance. Revised Version: 1.2 Effective from: August 2014 Next review date: August 2015

Information Security Adults Services. Practice guidance. Revised Version: 1.2 Effective from: August 2014 Next review date: August 2015 Information Security Adults Services Practice guidance Revised Version: 1.2 Effective from: August 2014 Next review date: August 2015 Sign off: Jenny Daniels Title: Head of Health and Social Care Practice

More information

Mobility and Young London Annex 4: Sharing Information Securely

Mobility and Young London Annex 4: Sharing Information Securely Young London Matters April 2009 Government Office For London Riverwalk House 157-161 Millbank London SW1P 4RR For further information about Young London Matters contact: younglondonmatters@gol.gsi.gov.uk

More information

USB Data Stick Procedure

USB Data Stick Procedure SH IG 41 INFORMATION SECURITY SUITE OF POLICIES Procedure for the Management of Personal Data Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: Next Review : This procedure

More information

E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience:

E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience: E-Mail Use Policy Authorship: Barry Jackson Information Governance, Security and Compliance Manager Committee Approved: Integrated Audit and Governance Committee Approved date: 11th March 2014 Review Date:

More information

Secure Transfer of Information Guidance for staff

Secure Transfer of Information Guidance for staff Secure Transfer of Information Guidance for staff Document number CCG.GOV.013.1.1 Version: 1.1 Ratified by: NHS Bury CCG Quality and Risk Committee Date ratified: 8 th January 2014 Name of originator /author

More information

Findings from ICO audits and reviews of community healthcare providers. June 2013 to December 2014

Findings from ICO audits and reviews of community healthcare providers. June 2013 to December 2014 Findings from ICO audits and reviews of community healthcare providers June 2013 to December 2014 Introduction The Information Commissioner s Office (ICO) is the regulator responsible for ensuring that

More information

Information Governance

Information Governance Information Governance Information for Patients Information Governance (IG) Contents: Identifying the IG Lead for the Practice. This identifies the main people responsible for Information Governance Policy.

More information

Broadband Acceptable Use Policy

Broadband Acceptable Use Policy Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2

More information

Introduction to the NHS Information Governance Requirements

Introduction to the NHS Information Governance Requirements Introduction to the NHS Information Governance Requirements 2 Version April 2014 Information Governance ensures necessary safeguards for, and appropriate use of, patient and personal information. The widely

More information

Email Policy and Code of Conduct

Email Policy and Code of Conduct Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Policy for the electronic transfer of Person Identifiable Data - harmonised Version: 5 Reference Number: CO51 Supersedes Supersedes: 4 Description of Amendment(s):

More information

E-Mail, Calendar and Messaging Services Good Practice Guideline

E-Mail, Calendar and Messaging Services Good Practice Guideline E-Mail, Calendar and Messaging Services Good Practice Guideline Programme NPFIT Document Record ID Key Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0017.01 Prog. Director Mark Ferrar Status

More information

Safe Haven Policy. Equality & Diversity Statement:

Safe Haven Policy. Equality & Diversity Statement: Title: Safe Haven Policy Reference No: 010/IT Owner: Deputy Chief Officer Author Information Governance Lead First Issued On: November 2012 Latest Issue Date: March 2015 Operational Date: March 2015 Review

More information

Somerset County Council - Data Protection Policy - Final

Somerset County Council - Data Protection Policy - Final Organisation Title Author Owner Protective Marking Somerset County Council Data Protection Policy - Final Peter Grogan Information Governance Manager Unclassified POLICY ON A PAGE Somerset County Council

More information

Information Governance Staff Handbook. Information Governance Staff Handbook

Information Governance Staff Handbook. Information Governance Staff Handbook Information Governance Staff Handbook Information Governance Staff Handbook August 2014 Version 2 Page 1 of 35 Document History Document Reference: IG42 The document compliments all other Information Governance

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance

More information

Safe Haven Procedure. Final. Date Issued March 2009 Review Date March 2010 NHS East Midland Employees. Safe Haven Procedure: v1.

Safe Haven Procedure. Final. Date Issued March 2009 Review Date March 2010 NHS East Midland Employees. Safe Haven Procedure: v1. Safe Haven Procedure Final Version 1.0 (Final) Ratified By Executive Team Originator/Author Fabian Henderson Date Issued March 2009 Review Date March 2010 Target NHS East Midland Employees Safe Haven Procedure:

More information

Data Access Request Service

Data Access Request Service Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations

More information

ENISA s ten security awareness good practices July 09

ENISA s ten security awareness good practices July 09 July 09 2 About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for the European

More information

SMS Text Messaging to Service Users Policy

SMS Text Messaging to Service Users Policy SMS Text Messaging to Service Users Policy Reference No: Version: 2 Ratified by: P_IG_24 LCHS Trust Board Date ratified: 29 th July 2014 Name of originator/author: Name of responsible committee/individual:

More information

Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer:

Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer: Secure Storage, Communication & Transportation of Personal Information Policy Version No: 3.0 Prepared By: Information Governance, IT Security & Health Records Effective From: 20/12/2010 Review Date: 20/12/2011

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has

More information

Trust Informatics Policy. Information Governance. Secure Transfer of Information Policy

Trust Informatics Policy. Information Governance. Secure Transfer of Information Policy Trust Informatics Policy Information Governance Policy Reference: 3628 Document Title Author/Contact Document Reference 3628 Document Control Pauline Nordoff-Tate, Information Assurance Manager Document

More information

Guidelines on use of encryption to protect person identifiable and sensitive information

Guidelines on use of encryption to protect person identifiable and sensitive information Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted

More information

DBC 999 Incident Reporting Procedure

DBC 999 Incident Reporting Procedure DBC 999 Incident Reporting Procedure Signed: Chief Executive Introduction This procedure is intended to identify the actions to be taken in the event of a security incident or breach, and the persons responsible

More information

Service Schedule for Business Email Lite powered by Microsoft Office 365

Service Schedule for Business Email Lite powered by Microsoft Office 365 Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft

More information

Angard Acceptable Use Policy

Angard Acceptable Use Policy Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants

More information

Why do we need to protect our information? What happens if we don t?

Why do we need to protect our information? What happens if we don t? Warwickshire County Council Why do we need to protect our information? What happens if we don t? Who should read this? What does it cover? Linked articles All WCC employees especially mobile and home workers

More information

Making use of Secure Email. Sharing Data and working collaboratively securely in health and social care

Making use of Secure Email. Sharing Data and working collaboratively securely in health and social care Making use of Secure Email Sharing Data and working collaboratively securely in health and social care Paul Bourke-Cockerill - 13 th August 2014 Background Secure email can transform how organisations

More information

merchant application form

merchant application form merchant application form standard & Point Of Sale (POS) Version 3.1 revised 28 February 2011 copyright mhits Limited 2004-2011 ABN 82 107 753 613 Instructions: 1. Fill in the Application Form 2. Sign

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Rev Date Purpose of Issue/ Description of Change Equality Impact Assessment Completed 1. June 2011 Initial Issue 2. 29 th March 2012 Second Version 3. 15 th April 2013 Third

More information

PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY

PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY CORPORATE POLICY Document Control Title Paper Records Secure Handling and Transit Policy Author Information Governance Manager ** Owner SIRO/CIARG Subject

More information

Bulk Data Transfer Guidelines

Bulk Data Transfer Guidelines Bulk Data Transfer Guidelines This procedural document supersedes: CORP/ICT 20 v.1 Bulk Data Transfer. Did you print this document yourself? The Trust discourages the retention of hard copies of policies

More information

Data Encryption Policy

Data Encryption Policy Data Encryption Policy Please be aware that this printed version of the Policy may NOT be the latest version. Staff are reminded that they should always refer to the Intranet for the latest version. Purpose

More information

Bexley Safeguarding Children Board. Information Sharing and Secure Document Transfer Guidance

Bexley Safeguarding Children Board. Information Sharing and Secure Document Transfer Guidance Bexley Safeguarding Children Board Information Sharing and Secure Document Transfer Guidance All professionals who work with children and young people, or with adults who are parents or carers, should

More information

GCSx Email Guide for Internal Users. How to send sensitive business and personal information securely

GCSx Email Guide for Internal Users. How to send sensitive business and personal information securely GCSx Email Guide for Internal Users How to send sensitive business and personal information securely Document control Description Version V.2 Created May 2013 GCSx Email Guide for Internal Users Status

More information

Date of review: Information Governance Group January 2016. Policy Category: CONTENT SECTION DESCRIPTION PAGE

Date of review: Information Governance Group January 2016. Policy Category: CONTENT SECTION DESCRIPTION PAGE Title: Date Approved: January 2015 Division/Department: Corporate Services Corporate Records Policy Approved by: Date of review: Information Governance Group January 2016 Author (post-holder): Interim

More information

CONTACTING SERVICE USERS BY TEXT MESSAGES (SMS) POLICY

CONTACTING SERVICE USERS BY TEXT MESSAGES (SMS) POLICY CONTACTING SERVICE USERS BY TEXT MESSAGES (SMS) POLICY POLICY NUMBER 098/Corporate POLICY VERSION 1 RATIFYING COMMITTEE Information Governance Group DATE RATIFIED May 2012 DATE OF EQUALITY & HUMAN RIGHTS

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

A Framework for the Safe and Secure Use & Management of Community Pharmacy NHSmail email including Generic Mailboxes

A Framework for the Safe and Secure Use & Management of Community Pharmacy NHSmail email including Generic Mailboxes A Framework for the Safe and Secure Use & Management of Community Pharmacy NHSmail email including Generic Mailboxes Contents 1 Introduction 3 2 NHSmail Acceptable Use Policy 3 3 Objectives 4 4 General

More information

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Indirani 02/11/2009 Draft 2 Include JG s comments Jackie Groom

More information

LINCOLNSHIRE COUNTY COUNCIL. Information Security Policy Framework. Document No. 8. Email Policy V1.3

LINCOLNSHIRE COUNTY COUNCIL. Information Security Policy Framework. Document No. 8. Email Policy V1.3 LINCOLNSHIRE COUNTY COUNCIL Information Security Policy Framework Document No. 8 Email Policy V1.3 Document Control Reference V1.3 Email Policy Date 17 July 2015 Author Approved by Version History David

More information

Data Transfer Policy London Borough of Barnet

Data Transfer Policy London Borough of Barnet London Borough of Barnet DATA PROTECTION 11 Document Control Document Description Data Transfer Policy Version v.2 Date Created December 2010 Status Authorisation Name Signature Date Prepared By: IS Checked

More information

your hospitals, your health, our priority STANDARD OPERATING PROCEDURE: Safe Haven Procedure TW10-110 SOP 3 SOP NO: VERSION NO:

your hospitals, your health, our priority STANDARD OPERATING PROCEDURE: Safe Haven Procedure TW10-110 SOP 3 SOP NO: VERSION NO: STANDARD OPERATING PROCEDURE: Safe Haven Procedure SOP NO: VERSION NO: APPROVING COMMITTEE: DATE THIS VERSION APPROVED: TW10-110 SOP 3 3 Information Governance Committee July 2013 RATIFYING COMMITTEE:

More information

Personal Identifiable Data Security Policy

Personal Identifiable Data Security Policy Personal Identifiable Data Security Policy Number: THCCGCG43 Version: 01 Executive Summary This Policy defines the Security requirements for all Staff involved in handling Person Identifiable Data (PID)

More information

Data Transfer and Security Best Practice Principles for UK-based businesses that collect and use data for online lead generation

Data Transfer and Security Best Practice Principles for UK-based businesses that collect and use data for online lead generation Online Lead Generation: Data Transfer and Security Best Practice Principles for UK-based businesses that collect and use data for online lead generation Version: 1.1 Released: 10 March 2011 Updated: 02

More information

Service Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365

Service Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION 1.1 The Service enables the Customer to: set up a web site(s); create a sub-domain name associated with the web site; create email addresses. 1.2 The email element of the Service

More information

Information Security Policy for Associates and Contractors

Information Security Policy for Associates and Contractors Policy for Associates and Contractors Version: 1.12 Status: Issued Date: 30 July 2015 Reference: 61418080 Location: Livelink Review cycle: Annual Contents Introduction... 3 Purpose... 3 Scope... 3 Responsibilities...

More information

Additional Information

Additional Information HIPAA Privacy Procedure #17-7 Effective Date: April 14, 2003 Reviewed Date: February, 2011 Communication of Electronic Protected Health Revised Date: Information by E-mail Scope: Radiation Oncology ****************************************************************************

More information

Information governance

Information governance Information governance Staff handbook RDaSH 88 02 Information governance Introduction to information governance Overview 88 03 Information governance or IG - includes information security and confidentiality,

More information

Policy Document. Communications and Operation Management Policy

Policy Document. Communications and Operation Management Policy Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author

More information

Information Security Policy. Appendix B. Secure Transfer of Information

Information Security Policy. Appendix B. Secure Transfer of Information Information Security Policy Appendix B Secure Transfer of Information Author: Data Protection and Information Security Officer. Version: 0.7 Date: March 2008 Document Control Information Document ID Document

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Electronic Mail Policy Version: 5 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 26/10/2015 HSCIC Audit of Data Sharing

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Information Incident Management. and Reporting Policy

Information Incident Management. and Reporting Policy Information Incident Management and Reporting Policy Policy ID IG10 Version: 1 Date ratified by Governing Body 21/3/2014 Author South CSU Date issued: 21/3/2014 Last review date: N/A Next review date:

More information

Guidance for sending and receiving an encrypted NHSmail e-mail

Guidance for sending and receiving an encrypted NHSmail e-mail Contents Guidance for sending and receiving an encrypted NHSmail e-mail Introduction 2 Sending an encrypted e-mail to a VERIFIED e-mail address 2 Receiving an encrypted e-mail 4 Reply to and forward encrypted

More information

ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING

ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING Introduction and Policy Aim The Royal Borough of Windsor and Maidenhead (the Council) recognises the need to protect Council

More information

Protect your personal data while engaging in IT related activities

Protect your personal data while engaging in IT related activities Protect your personal data while engaging in IT related activities Personal Data (Privacy) Ordinance Six Data Protection Principles Principle 1 purpose and manner of collection of personal data Collection

More information

DATA PROTECTION LAWS OF THE WORLD. India

DATA PROTECTION LAWS OF THE WORLD. India DATA PROTECTION LAWS OF THE WORLD India Date of Download: 6 February 2016 INDIA Last modified 27 January 2016 LAW IN INDIA There is no specific legislation on privacy and data protection in India. However,

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

TERMS AND CONDITIONS OF REMOTE DATA TRANSMISSION

TERMS AND CONDITIONS OF REMOTE DATA TRANSMISSION TERMS AND CONDITIONS OF REMOTE DATA TRANSMISSION I. Scope of services 1. The bank offers to its customers (account holders) data transmission by electronic means hereinafter referred to as remote data

More information

USE OF PERSONAL MOBILE DEVICES POLICY

USE OF PERSONAL MOBILE DEVICES POLICY Policies and Procedures USE OF PERSONAL MOBILE DEVICES POLICY Date Approved by Information Strategy Group Version Issue Date Review Date Executive Lead Information Asset Owner Author 15.04.2014 1.0 01/08/2014

More information

Secure Email Frequently Asked Questions

Secure Email Frequently Asked Questions Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support

More information

Acceptable Use and Publishing Policy

Acceptable Use and Publishing Policy 1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Policy Summary This policy outlines the organisation s approach to the management of Information Governance and information handling. It explains the accountability and reporting

More information

ONLINE PAYMENT PRIVACY POLICY

ONLINE PAYMENT PRIVACY POLICY ONLINE PAYMENT PRIVACY POLICY Updated: June, 2013 In order to operate the College online-payments system, Sanjari International College (SIC) may collect and store personal information student/customer

More information

NHS Information Governance - A Guide to Social Networking

NHS Information Governance - A Guide to Social Networking NHS Information Governance: Information Risk Management Guidance: Social Interaction Good Practice Department of Health Informatics Directorate February 2012 1 Amendment History Version Date Amendment

More information

Faster, better, safer communications

Faster, better, safer communications Faster, better, safer communications Using email in health and social care (in England) For patients and healthcare professionals March 2015 Acknowledgements This project was funded by the NHSmail team

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Version Control Sheet Title: Purpose: Owner: Information Communications Technology Policy To advise staff of the procedures

More information

Policy Document Control Page. Updated to include new NHS mail encryption feature

Policy Document Control Page. Updated to include new NHS mail encryption feature Policy Document Control Page Title Title: Electronic Mail Policy Version: 6 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version

More information

Frequently Asked Questions on new guidance for email in NHSScotland

Frequently Asked Questions on new guidance for email in NHSScotland May 2012 Approved Frequently Asked Questions on new guidance for email in NHSScotland 1) Why the need for new guidance? There is confusion as to what can be sent between NHSScotland boards, to business

More information

INTERNET AND EMAIL POLICY

INTERNET AND EMAIL POLICY Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy

More information

UBC Incident Response Plan

UBC Incident Response Plan UBC Incident Response Plan Contents 1. Rationale... 1 2. Objective... 1 3. Application... 1 4. Definitions... 1 4.1 Types of Incidents... 1 4.2 Incident Severity... 2 4.3 Information Security Unit... 2

More information

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced

More information

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

INSTANT MESSAGING SECURITY

INSTANT MESSAGING SECURITY INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part

More information

Using text messaging services:

Using text messaging services: ehealth and nursing practice Using text messaging services: an RCN guide on using technology to complement nursing practice RCN Legal Disclaimer This publication contains information, advice and guidance

More information

Guidance Regarding Skype and Other P2P VoIP Solutions

Guidance Regarding Skype and Other P2P VoIP Solutions Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,

More information

NHS Commissioning Board: Information governance policy

NHS Commissioning Board: Information governance policy NHS Commissioning Board: Information governance policy DOCUMENT STATUS: To be approved / Approved DOCUMENT RATIFIED BY: DATE ISSUED: October 2012 DATE TO BE REVIEWED: April 2013 2 AMENDMENT HISTORY: VERSION

More information

Information Incident Management and Reporting Procedures

Information Incident Management and Reporting Procedures Information Incident Management and Reporting Procedures Compliance with all policies, procedures, protocols, guidelines, guidance and standards is a condition of employment. Breach of policy may result

More information

Online Research and Investigation

Online Research and Investigation Online Research and Investigation This document is intended to provide guidance to police officers or staff engaged in research and investigation across the internet. This guidance is not a source of law

More information

INFORMATION GOVERNANCE STAFF HANDBOOK

INFORMATION GOVERNANCE STAFF HANDBOOK INFORMATION GOVERNANCE STAFF HANDBOOK Contents Why do YOU need to know about Information Governance (IG)?... 2 Keeping Information Safe... 2 Confidentiality... 2 Deciding to Communicate Important Information...

More information

Secure Email User Guide

Secure Email User Guide Secure Email User Guide Contents Secure email at HSBC. 2 About SecureMail... 2 Receiving a secure email sent via SecureMail 3 Opening a secure email sent via SecureMail... 4 Resetting your SecureMail password..

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Version: 4 Bodies consulted: Caldicott Guardian, IM&T Directors Approved by: MT Date Approved: 27/10/2015 Lead Manager: Governance Manager Responsible Director: SIRO Date

More information